Modern communication and computing devices have the potential to increase the efficiency of disaster response. Mobile agents and seamless push-to-talk communication embody decentralised and flexible technologies to leverage this potential. While mobile agent platforms are facing greater variety of security risks compared to a classical client-server approach, trusted computing is capable of alleviating these problems. This document describes design and integration of a Secure Agent Infrastructure (SAI) with a Secure Docking Module (SDM) based on trusted computing principles for crisis management support. SDM provides a single chip security device that replaces the centralized trust decision and point with a suitable distributed solution. The main goal of SDM is protecting information. The protected information is only released to a requesting host device if the host is in a trusted state and adheres to a specific set of policies. SAI relies on the crypto-material protected by SDM thus the mobile agent can be unsealed only if the host machine is in the trusted state. The paper introduces the SDM and SAI technologies, describes motivation of SDM usage, provides summary of the key concepts behind the SDM and SAI. Further we provide analysis of requirements and security considerations as well as the integration points of the proposed architecture with other involved systems and the communication adapters between agents and other legacy systems. The last section concludes the article and presents our current achievements in integration and demonstration of the proposed technologies.
[1]
Jason Michael Honda.
Application of mobile agent systems to first responder training
,
2009
.
[2]
Moshe Kam,et al.
Service-based computing on manets: enabling dynamic interoperability of first responders
,
2005,
IEEE Intelligent Systems.
[3]
Abraham Martín-Campillo,et al.
Mobile Agents for Critical Medical Information Retrieving from the Emergency Scene
,
2009,
PAAMS.
[4]
Siani Pearson,et al.
Trusted Computing Platforms: TCPA Technology in Context
,
2002
.
[5]
Nalini Venkatasubramanian,et al.
DrillSim: A Simulation Framework for Emergency Response Drills
,
2006,
ISI.
[6]
Milind Tambe,et al.
Agent-Based Simulations for Disaster Rescue Using the DEFACTO Coordination System
,
2005,
Emergent Information Technologies and Enabling Policies for Counter-Terrorism.
[7]
V. Lakshmi Narasimhan,et al.
A new classification scheme for software agents
,
2005,
Third International Conference on Information Technology and Applications (ICITA'05).
[8]
Thomas Morris,et al.
Trusted Platform Module
,
2011,
Encyclopedia of Cryptography and Security.